Cyber security management : a governance, risk and compliance framework / Peter Trim, Yang-Im Lee.
Material type: TextPublisher: Oxon, England : Routledge, 2016Description: xxii, 240 pages : illustrations ; 26 cmContent type:- text
- unmediated
- volume
- 9781472432094
- 658.478 TR.C 2016 23
- HF5548.37 .T74 2014
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | The Knowledge Hub Library | Computing | 658.478 TR.C 2016 (Browse shelf(Opens below)) | Not For Loan | 190447 |
"A Gower Book"--Cover.
"First published 2014 by Grower Publishing"--Title page verso.
Includes bibliographical references and index.
Introduction and background to the research -- Sequence-of-events model -- Organizational strategic governance framework -- Business continuity management planning framework -- Communication risk management strategy -- Risk assessment policy and its strategic context -- Resilience policy and strategy mapping -- Integrated resilience management model -- Integrated management model and system -- Integrated governance mechanism -- Threat identification -- Competitor and marketing analysis -- Governance and compliance decision making process -- Integrated security mechanism -- Modified and Extended Generic Cyber Security Management Model (MEGCSMM) and strategic management framework, and project liaison team management -- Recommendations for counteracting cyber threats.
This book includes a sequence-of-events model; an organizational governance framework; a business continuity management planning framework; a multi-cultural communication model; a cyber security management model and strategic management framework; an integrated governance mechanism; an integrated resilience management model; an integrated management model and system; a communication risk management strategy; and recommendations for counteracting a range of cyber threats. It simplifies complex material and provides a multi-disciplinary perspective and an explanation and interpretation of how managers can manage cyber threats in a pro-active manner and work towards counteracting cyber threats both now and in the future.
There are no comments on this title.